ISGTC: an alternative to bofh/bin

Size: px
Start display at page:

Download "ISGTC: an alternative to bofh/bin"

Transcription

1 ISGTC: an alternative to bofh/bin David Schweikert presented at the SANE 2004 conference on the Introduction Scripts let us do system administration in an efficient and reliable way. These scripts are so useful to us because they are powerful. But like rm -rf, which is undeniably very useful, they are also very dangerous because of that power. One mistake and a disaster might happen. That s why it is important for this kind of tools to be dependable. Not only do they need to work reliably, they also must have an understandable and consistent user interface to minimize the risk of human mistakes. This can be achieved by having a standard on how administration scripts are developed and how they should behave. At the ISG.EE, a system administration group at the ETH Zurich, we never found the time and courage to write such a standard and decide that all our administration scripts should follow it. There were many choices to be made and having to select what is best for us among many possible variants, blocked us from achieving such a standardization. Finally, in the year 2001, we came up with the IT Support Group Tool Chest (IS- GTC). The ISGTC contains 37 rules that must be followed when writing a new tool and contains more than 100 administration scripts that follow those rules. All the scripts are released under the GNU General Public License (GPL). I will describe some of them in section 4. 2 Guiding principles As system administrators, we take a different approach to computers than other users. We try to understand why computers behave the way they do, write scripts to automate repetitive tasks, do optimizations so that the services are as reliable and useful to the users as possible,... While working as system administrator, we gather experience on how administration should be done. At the ISG.EE we did formulate some basic principles of system administration, that are based on our experience. This section is a short summary of these principles, 1

2 which form also the basis for the administration script policy that I will describe later on. 2.1 Documentation Documentation is one of the most often neglected tasks of a system administrator. It is very challenging to keep up with user needs and at the same time to document the current state of the managed system. Documentation is however also, in my opinion, the most basic requirement for reliable and efficient system administration. Only with proper documentation I can make sure somebody else can understand how to run the system. Even I will eventually forget all the details about something that I setup today. 2.2 Reproducibility We control the systems we manage, and not the other way around. They work the way they do as a result of controlled administration and not of as a result of random interactive changes. We can re-install from scratch any of our machines exactly as they were before. Besides greater reliability, reproducible system administration also means that we work more efficiently, since we can rapidly repeat tasks in case of hardware upgrades or if we want to do a similar setup somewhere else. Poor reproducibility is the main main drawback of interactive configuration tools. If I click-enable an entry in some context sensitive menu, I might forget to do the same the next time around. If a system is properly documented, its setup is also reproducible. The documentation just includes the necessary human steps for replaying what was done before. 2.3 Versioning and Accountability In order to guarantee that useful information isn t lost, we keep the full history of the documentation and configuration files through a version control system such as Subversion. We can retrieve an old version if for example a mistake was done and we can look at the history of the system documentation to see what was changed to the system. When many people work together it allows them to keep up with each other. Version control also allows all the administrators in the group to work in parallel on the same set of files and we can track who did what change to what file. This is very useful to aid in debugging when something doesn t work anymore or is not clear to somebody: you can find out who did the change and ask him/her directly. 2

3 2.4 Automation Doing the same thing again and again is not only inefficient, but also boring and thus error-prone. If there is a pattern of actions, I can automate them with a script. This will make the required work faster and more reliable since those repetitive tasks will always be done the same way. If some procedure is automated, I also need less to document, since I only have to describe how to start the script instead of every single step. 2.5 Redundancy avoidance One of the worst enemies of a system administrator is redundancy. As soon as the same configuration information lives in two files, there is a potential problem of inconsistency. We might make a change in one file and forget to update the other. Therefore we try to avoid redundancy whenever possible. If the same information needs to be in different places, then we make sure that it is clear which one is the authoritative source and possibly automatically generate the others. 3 The ISGTC policy I will now explain the most important rules in our administration scripts policy. The full text of the policy is also available on the ISGTC home-page (see the address at end of this article). 3.1 The isgtc tree and relocatability By default the ISGTC scripts and configuration files are stored in/usr/isgtc with the following sub-directories: bin lib etc tool binaries (bindir) libraries (libdir) configuration files (sysconfdir) share read-only data (datadir) man var src man-pages (mandir) read/write data (localstatedir) sources for the tools and libraries (srcdir) While the ISGTC has a standard installation location, every script is relocatable. ISGTC paths such as /usr/isgtc/etc are not written explicitly into the scripts. Instead special magic variables such as ISGTC_MAGIC_BINDIR are used. The 3

4 ISGTC could, for example, be configured to have binaries in /opt/isgtc and configuration files in /etc/opt/isgtc. 3.2 Sources and version control The sources of the scripts are located in srcdir. Every script or library has a directory, which contains the source code and related files. We call these directories modules. With the exception of sysconfdir, which contains the configuration, and localstatedir, which contains data saved by the scripts, the other ISGTC directories are populated exclusively by installing modules from srcdir using the installation script isgtc install. Because the files in other directories are derived from it, srcdir is the only directory under version control. 3.3 Ownership Every module has a defined owner, who is responsible for maintaining it. There is also an ISGTC owner, who is responsible for keeping the ISGTC as a whole in good shape. He/she ensures, that the ISGTC doesn t contain scripts with similar functionality or obsolete tools and also makes sure that the policy is respected. 3.4 META file and installation of modules isgtc install reads a description of the modules and what files to install from a file called META inside the module directory in srcdir. It configures and installs binaries, libraries, man-pages, and data files. Listing 1 shows as an example the META file of the diskadm module. The *** install *** section specifies that src/diskadm/diskadm should be installed as /usr/isgtc/bin/diskadm. In addition, the man-pages written in POD, the Perl inline documentation format, will be extracted and put in /usr/isgtc/man. The META file also contains information about the owner of the module, what version of the policy document was used, on what platform it runs (either unix or win32), what kind of module it is (tool or library), and what other modules it depends on. You can think of source modules as sort of packages like RPM, where the META file is the description of the package. 3.5 User documentation Every module must have user documentation in POD format, which can be converted to man-pages and a number of other formats like HTML. If possible, the 4

5 Listing 1: /usr/isgtc/src/diskadm/meta policy = 1.2 name = diskadm type = tool platform = unix description = Disk administration tool pod = diskadm, diskadm-design.pod owner = dws *** install *** # perm/owner source dest 755 root:root diskadm ISGTC/bin *** depends *** ISG_Util ISG_DisksConfig ISG_Solaris_DiskUtils documentation is kept in the script itself so that it is easier to keep the documentation and code synchronized. The isgtc_install tool will verify that documentation is available and that it contains mandatory sections, such as SYNOPSIS and COPYRIGHT. 3.6 Options The GNU syntax for long-options is supported by every tool and the following options are mandatory: --help, -h --version Help on usage of the tool. Version information. --noaction, -n Do not do any changes to the system, just show what would be done. If not implemented, the script must die with an error message. --verbose, -v Be more verbose about what is done. This option may be ignored. Consistent options are important to ensure predictable behavior of scripts. Imagine the account removal script doesn t follow this rule and uses -n to activate the no-questions-asked mode. 5

6 3.7 Site independence All scripts in the ISGTC must be site independent. This means that they must not contain installation-specific information such as hostnames or paths. In that way, we can make sure that configuration information really is in sysconfdir and that we can reuse the tool in other setups. Site-independence also means that you can use them too. 3.8 Configuration files syntax Configuration files are placed in sysconfdir (by default /usr/isgtc/etc) and are called either just toolname.conf or alternatively toolname/xxy.conf if more than one file is necessary. It should be possible to share sysconfdir among different hosts. That s why often the configuration files are called toolname/hostname.conf, so that different configuration files for different hosts can be specified. Configuration files are text based and use a very simple and human-readable syntax. The META file shown in listing 1 is an example of the syntax used for the configuration of ISGTC scripts. 3.9 Administrator profiles In our group 13 persons have the root password. In order to trace who did what change to the system, such as creating a new user, there is a login utility called isgtc_login, that is started in the root profile. Every time an administrator logs in as root, he identifies himself by typing his username. This causes environment variables to be set, so that ISGTC scripts can log who did what. As an added bonus, each administrator can configure its root environment, including shell and editor. I am really awkward when I type in a tcsh of a colleague with vi-like key bindings, but on the other hand he works better with it, so it is really nice that we can have it both ways Programming language and style ISGTC tools are written in one common language, which is in our case Perl. Having only one programming language makes understanding the code for all the people involved in writing and maintaining the scripts easier. It also makes code sharing between modules simple. Of course, if for some reason another language is required, then that language is used. We did also define how the code should look like, so that it is easier to read and consistent throughout. We did choose the style as defined in the perlstyle man-page. 6

7 3.11 Testing The isgtc_install script can automatically run test scripts before it installs a given module. With this you can make sure that for example a configuration parsing module always parses all test cases correctly. If there is a test script and it fails, the module isn t installed. This can be very useful when extending a library: you can guarantee that your changes are not going to affect the existing tools based on it. The quality of the whole ISGTC is improved by such automatic tests. 4 Some ISGTC tools In this paper I mainly wanted to show you the benefits of having a policy on administration scripts and maybe convince you to take the ISGTC policy as a basis to write your own. Something else that might be useful to you are the scripts themselves. We have written more than 100 scripts over the past 4 years and use them on a daily basis to solve all kinds of system administration tasks. All of these scripts are free software released under the GNU General Public License and can be downloaded from the ISGTC home-page. Although most tools are configurable and are made generic, they might make some assumptions about the environment they run in. For example, we use the NIS+ directory service everywhere, so many tools assume that. Therefore some tools might just be perfect as-is for you, some might require some modifications, and some might be only an inspiration for a new tool of yours. In this section I will present a selection of ISGTC tools, which I find particularly interesting. Have a look at the ISGTC home-page for the full list. 4.1 accountmgr accountmgr is a tool to create accounts using a configuration file that specifies the needed information. It takes care of creating the passwd entry (currently in NIS+), creates the home-directory, sets file-system quotas, and creates aliases. The biggest installation we manage has currently 3068 accounts. In order to have a grasp on all these accounts, we need to know more than the first and last name of the user. Every account that we create belongs to a specific group or customer, which we call lab, and is classified by type: syst for system accounts, stud for students, staff for employees, proj for projects and group accounts, guest, and ueb for anonymous accounts used for exercises. According to the type, additional information is required. For proj accounts you must, for example, define an expiry date, so that you are forced to actively renew it, and a contact address, so that the owner of the account can be reached. 7

8 Listing 2: Gecos field with additional information Example,proj,nari,2004/04/26,*,2005/12/31, Joe User <joe@ethz.ch> all types: 1: title 2: type 3: lab 4: creation date 5: quota proj-specific: 6: expiry date 7: contact The authoritative source of information for accounts is the passwd table and we use the gecos field to preserve all the specified information. Listing 2 shows an example gecos field for a project account. 4.2 dbaccmgr dbaccmgr is a tool to create database accounts. The authoritative information about the accounts is stored in the configuration of dbaccmgr under sysconfdir. dbaccmgr reads what should be present on the system and creates any missing accounts. That way we have a documentation about the creation date, the administrator that created it, for what project it is used and who is responsible for it. When I want to create a new database, I do the following: 1. Add a line for the database in my CVS copy of etc/dbaccmgr/servername.conf 2. CVS-commit the change 3. CVS-update /usr/isgtc/etc/dbaccmgr/servername.conf 4. Run dbaccmgr This might seem a lengthy process but it actually takes less than 5 minutes. The documentation advantage is well worth the effort. 4.3 homemover With homemover you can move users homes from one directory to another local or remote directory. Moving a home-directory is pretty complex, because lots of small things need to be fixed after the move has been made, so that the whole system remains in a consistent state. homemover solves the problem that many things can go wrong when moving homes, by first analyzing what there is to do, making a plan of what needs to be done and asking the user if it is OK to proceed. This plan is afterward used not only for deciding what to do, but also to bring back the system to a sane state in case of an error, by following the plan backwards. 8

9 Listing 3: homemover in action homemover tardis:/usr/tardis/home-a/dws \ tardis:/usr/tardis/home-b/dws Due actions: 1. HOMELINK_RM /home/dws 2. NISAUTO_RM /home/dws 3. LOCAL_CHMOD /usr/tardis/home-a/dws 0 4. LOCAL_COPY /usr/tardis/home-a/dws /usr/tardis/home-b/dws 5. LOCAL_CHMOD /usr/tardis/home-b/dws LOCAL_VERIFY /usr/tardis/home-a/dws /usr/tardis/home-b/dws 7. HOMELINK_ADD /home/dws /usr/tardis/home-b/dws 8. NISAUTO_ADD /home/dws tardis:/usr/tardis/home-b/dws 9. LOCAL_REMOVE /usr/tardis/home-a/dws 10. QUOTACHECK /usr/tardis/home-a 11. QUOTACHECK /usr/tardis/home-b Proceed? [no] For example, the size of the old and new home-directory is checked to be the same at the end. If it isn t, everything is put back as it was before, so that the problem can be safely analyzed and a retrial can be done later. Listing 3 shows homemover asking for confirmation. HOMELINK_ADD/RM is for adding or removing sym-links in /home and NISAUTO_ADD/RM is for adding or removing automounter entries in NIS+ (we use both: sym-links on the servers and automounted homes on the clients). 4.4 isgsnap Solaris 8 04/01 introduced file-system snapshots. It was finally possible to make reliable backups without bringing the system down to single user mode. That s really great, but there is a catch: creating snapshots is pretty complicated and difficult to automate for doing backups. isgsnap is a script that takes care of all the snapshot creation details on Solaris: Suspends special processes that might be locking the file-system. Automatically chooses a disk to use as backing store for saving all changes to the disk since the snapshot was created. Creates a file with the PIDs of the processes using the snapshot and removes the snapshot only if no one else is using it, so that it is possible, for example, to do a backup dump and at the same time create a mirror of the disk. 9

10 *** partitions *** Listing 4: Example /etc/disks.conf # MOUNT-POINT SIZE TYPE(OPTIONS) + c0t0d0 / 4000 ufs(logging) swap 4000 swap(nomount) /scratch free ufs(logging) *** permissions *** /scratch 1777 root:root *** exports *** /scratch nfs(nosuid,rw=login-01:nova) 4.5 diskadm Like I said, systems should be documented and it would be nice to have accountability to find out who did what, when. What about the disks configuration such as partition tables, mount points, mount options, and the exported shares? diskadm s job is to configure disks according to a configuration file called /etc/disks.conf. The configuration file specifies how each disk should be configured. diskadm compares this target state to the current state and builds up a list of actions required to bring the two in sync. We tried to put all the complex code in this planning phase, which will be seen by the user when asking for confirmation, so that it is very safe to use. Listing 4 shows an example configuration and listing 5 shows diskadm asking for confirmation to proceed according to the displayed plan of action. Besides documenting and making it easier to configure disks, diskadm is also useful with disk-less clients. You can have hundreds of machines, with disks that need to be partitioned according to your wishes. For such situations there is a --batch option that disables asking for confirmation. 4.6 mirror root RAID-1 mirroring of the root disk is really a good idea: if the root disk fails you will spare your users a long down-time. That s the theory anyway. What if it is not an hardware failure but a human mistake? Let s say you update your system and some library breaks so badly, that the system crashes and you can t boot it anymore. Your RAID-1 mirror is not going to help you because all the changes were dutifully replicated to the other disk. 10

11 # diskadm Due actions: Listing 5: Example diskadm session 1. PARTITION c0t0d0 from: 0: M M 1: M M 2: M M to: 0: M M 1: M M 2: M M 3: M M 2. FORMAT c0t0d0s1 3. FORMAT c0t0d0s3 4. FSTAB_CHANGE /dev/dsk/c0t0d0s1 - /dev/dsk/c0t0d0s1 /dev/rdsk/c0t0d0s1 /scratch ufs 2 yes - + /dev/dsk/c0t0d0s1 - - swap - no - 5. FSTAB_ADD /dev/dsk/c0t0d0s3 + /dev/dsk/c0t0d0s3 /dev/rdsk/c0t0d0s3 /scratch ufs 2 yes - Proceed? [no] mirror_root is a disk mirroring tool, which copies one disk to another, including the partition table. We run it every week on early Monday morning, so that not only we can use it to recover from hardware failures, but we can also use it to recover from fatal mistakes that we might do during the week. 4.7 patchfetch2 Currently we install on our Solaris machines 274 patches. The process of selecting, testing and installing requires a lot of time, also because of this huge number. We did write patchfetch2 to help us manage them efficiently. The most interesting aspect of the script is its user interface: the selection of the patches is done with an editor. patchfetch2 produces a list of patches that are appropriate for the packages that you have installed on your system and starts an editor, where you can mark the patches that you want to download. Every patch has a lot of information stored in a README file, that might be interesting to read in order to decide if you want to install it. Therefore we use a folding editor, that can collapse many lines into one, just showing the first. The patch list contains one line per patch, with the README collapsed under each patch. 11

12 4.8 tetre2 We manage about 300 Unix machines. If our name-server changes, we don t want to go and fix /etc/resolv.conf manually on every one of them. tetre2 (Template Tree II) is our solution to this problem. All changes to the system are grouped by functionality. For example, all changes that are required in order to configure a Postfix client are put together in a single feature named postfix_client-1.0-ds. You can think of features as a sort of specialized packages for system changes. The features themselves can expose parameters: for example, the mentioned Postfix client feature needs two parameters, the mail domain and the hostname of the mail server. A central configuration file specifies which features have to be installed on which machines. In the same file the features also are parametrized according to the specific needs. We can configure a group of machines which uses a certain mail server and another group that uses another. All the configuration steps are executed by creating a cfengine file, that is then applied to each machine. There is a lot more to Template Tree II than what I described here. You can find more about it at: Windows tools The ISGTC is designed to be platform agnostic: it allows the integration of administration scripts for all the platforms that we manage. All the scripts we use for system administration on Windows are also integrated in the ISGTC. We install the Windows scripts so that they are available through a Samba share. They are configured with the UNC path of the share instead of /usr/isgtc/etc. Of particular importance are usermgr and hostmgr, which create users and windows hosts in the Active Directory according to a configuration file. bootmgr is a boot script management tool, similar to System V init scripts, with the difference that with a single configuration file we can specify what machines should run what scripts. We use it to install hotfixes, tighten permissions, fix the PATH environment variable,... Further information On the ISGTC home-page you can find the ISGTC policy document and all our scripts: 12

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

Chapter 11: File System Implementation. Objectives

Chapter 11: File System Implementation. Objectives Chapter 11: File System Implementation Objectives To describe the details of implementing local file systems and directory structures To describe the implementation of remote file systems To discuss block

More information

G54ADM Sample Exam Questions and Answers

G54ADM Sample Exam Questions and Answers G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2

More information

Lesson 9 Transcript: Backup and Recovery

Lesson 9 Transcript: Backup and Recovery Lesson 9 Transcript: Backup and Recovery Slide 1: Cover Welcome to lesson 9 of the DB2 on Campus Lecture Series. We are going to talk in this presentation about database logging and backup and recovery.

More information

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209 CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon

More information

BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS

BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS There are two kinds of people: those who do regular backups and those who never had a hard drive failure Unknown. 1. Introduction The topic of doing backups

More information

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209 CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System

More information

Clean & Speed Up Windows with AWO

Clean & Speed Up Windows with AWO Clean & Speed Up Windows with AWO C 400 / 1 Manage Windows with this Powerful Collection of System Tools Every version of Windows comes with at least a few programs for managing different aspects of your

More information

(Refer Slide Time: 1:26)

(Refer Slide Time: 1:26) Information Security-3 Prof. V Kamakoti Department of Computer science and Engineering Indian Institute of Technology Madras Basics of Unix and Network Administration Operating Systems Introduction Mod01,

More information

Architecture. Steven M. Bellovin October 31,

Architecture. Steven M. Bellovin October 31, Architecture Steven M. Bellovin October 31, 2016 1 Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache

More information

File Systems: Interface and Implementation

File Systems: Interface and Implementation File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science File System Topics File Concept Access Methods Directory Structure File System Mounting File

More information

File Systems: Interface and Implementation

File Systems: Interface and Implementation File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture have been largely based on those from an earlier edition

More information

CVS. Computer Science and Engineering College of Engineering The Ohio State University. Lecture 21

CVS. Computer Science and Engineering College of Engineering The Ohio State University. Lecture 21 CVS Computer Science and Engineering College of Engineering The Ohio State University Lecture 21 CVS: Concurrent Version System Classic tool for tracking changes to a project and allowing team access Can

More information

Lab #2 Physics 91SI Spring 2013

Lab #2 Physics 91SI Spring 2013 Lab #2 Physics 91SI Spring 2013 Objective: Some more experience with advanced UNIX concepts, such as redirecting and piping. You will also explore the usefulness of Mercurial version control and how to

More information

Alan J. Perlis - Epigrams on Programming

Alan J. Perlis - Epigrams on Programming Programming Languages (CS302 2007S) Alan J. Perlis - Epigrams on Programming Comments on: Perlis, Alan J. (1982). Epigrams on Programming. ACM SIGPLAN Notices 17(9), September 1982, pp. 7-13. 1. One man

More information

Chapter 5: User Management. Chapter 5 User Management

Chapter 5: User Management. Chapter 5 User Management Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts

More information

User Scripting April 14, 2018

User Scripting April 14, 2018 April 14, 2018 Copyright 2013, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and

More information

Ext3/4 file systems. Don Porter CSE 506

Ext3/4 file systems. Don Porter CSE 506 Ext3/4 file systems Don Porter CSE 506 Logical Diagram Binary Formats Memory Allocators System Calls Threads User Today s Lecture Kernel RCU File System Networking Sync Memory Management Device Drivers

More information

CS4023 Week04 Lab Exercise

CS4023 Week04 Lab Exercise CS4023 Week04 Lab Exercise Lab Objective: We will use this lab to log in to our Linux accounts and to look at some simple programs that perform a few elementary system calls. By the end of the lab we will

More information

Lab 1: Accessing the Linux Operating System Spring 2009

Lab 1: Accessing the Linux Operating System Spring 2009 CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

client X11 Linux workstation

client X11 Linux workstation LPIC1 LPIC Linux: System Administrator LPIC 1 LPI command line LPIC-1 Linux LPIC-1 client X11 Linux workstation Unix GNU Linux Fundamentals Unix and its Design Principles FSF and GNU GPL - General Public

More information

Implementation should be efficient. Provide an abstraction to the user. Abstraction should be useful. Ownership and permissions.

Implementation should be efficient. Provide an abstraction to the user. Abstraction should be useful. Ownership and permissions. File Systems Ch 4. File Systems Manage and organize disk space. Create and manage files. Create and manage directories. Manage free space. Recover from errors. File Systems Complex data structure. Provide

More information

File Systems Ch 4. 1 CS 422 T W Bennet Mississippi College

File Systems Ch 4. 1 CS 422 T W Bennet Mississippi College File Systems Ch 4. Ë ¾¾ Ì Ï ÒÒ Ø Å ÔÔ ÓÐÐ 1 File Systems Manage and organize disk space. Create and manage files. Create and manage directories. Manage free space. Recover from errors. Ë ¾¾ Ì Ï ÒÒ Ø Å

More information

Chapter 7: File-System

Chapter 7: File-System Chapter 7: File-System Interface and Implementation Chapter 7: File-System Interface and Implementation File Concept File-System Structure Access Methods File-System Implementation Directory Structure

More information

Web Servers and Security

Web Servers and Security Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache has 49%; IIS has 36% (source: http://news.netcraft.com/archives/2008/09/30/

More information

Project 1 Balanced binary

Project 1 Balanced binary CMSC262 DS/Alg Applied Blaheta Project 1 Balanced binary Due: 7 September 2017 You saw basic binary search trees in 162, and may remember that their weakness is that in the worst case they behave like

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 18 Transaction Processing and Database Manager In the previous

More information

Fedora Core: Made Simple

Fedora Core: Made Simple Table of Contents Installing Fedora...2 Before you begin...2 Compatible Hardware...2 Minimum Requirements...2 Disk Space Requirements...2 Help! Booting from the CD ROM Drive Fails!...2 Installing Fedora

More information

Web Servers and Security

Web Servers and Security Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market (Apache has 70%; IIS has 20%) Both major servers have lots

More information

MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit

MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit Jurij Ivastsuk-Kienbaum jurij [at] device-image.de Revision History First draft March 14, 2006 This document describes a setup

More information

Exam LFCS/Course 55187B Linux System Administration

Exam LFCS/Course 55187B Linux System Administration Exam LFCS/Course 55187B Linux System Administration About this course This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Name: Instructions. Problem 1 : Short answer. [48 points] CMU / Storage Systems 20 April 2011 Spring 2011 Exam 2

Name: Instructions. Problem 1 : Short answer. [48 points] CMU / Storage Systems 20 April 2011 Spring 2011 Exam 2 CMU 18-746/15-746 Storage Systems 20 April 2011 Spring 2011 Exam 2 Instructions Name: There are four (4) questions on the exam. You may find questions that could have several answers and require an explanation

More information

ò Server can crash or be disconnected ò Client can crash or be disconnected ò How to coordinate multiple clients accessing same file?

ò Server can crash or be disconnected ò Client can crash or be disconnected ò How to coordinate multiple clients accessing same file? Big picture (from Sandberg et al.) NFS Don Porter CSE 506 Intuition Challenges Instead of translating VFS requests into hard drive accesses, translate them into remote procedure calls to a server Simple,

More information

ò Very reliable, best-of-breed traditional file system design ò Much like the JOS file system you are building now

ò Very reliable, best-of-breed traditional file system design ò Much like the JOS file system you are building now Ext2 review Very reliable, best-of-breed traditional file system design Ext3/4 file systems Don Porter CSE 506 Much like the JOS file system you are building now Fixed location super blocks A few direct

More information

rsync link-dest Local, rotated, quick and useful backups!

rsync link-dest Local, rotated, quick and useful backups! rsync link-dest Local, rotated, quick and useful backups! Scope No complete scripts will be presented Just enough so that a competent scripter will be able to build what they need Unixes used: OpenBSD,

More information

12 Common Mistakes while Backing Up Databases

12 Common Mistakes while Backing Up Databases 12 Common Mistakes while Backing Up Databases This article was initially intended for Firebird DBMS developers and administrators, but contacts with administrators of other databases made it clear that

More information

NFS. Don Porter CSE 506

NFS. Don Porter CSE 506 NFS Don Porter CSE 506 Big picture (from Sandberg et al.) Intuition ò Instead of translating VFS requests into hard drive accesses, translate them into remote procedure calls to a server ò Simple, right?

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Laboratory 1: Eclipse and Karel the Robot

Laboratory 1: Eclipse and Karel the Robot Math 121: Introduction to Computing Handout #2 Laboratory 1: Eclipse and Karel the Robot Your first laboratory task is to use the Eclipse IDE framework ( integrated development environment, and the d also

More information

Recipes. Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24

Recipes.  Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24 16 Recipes Email Marketing For Bloggers List Building, Traffic, Money & More A Free Guide by The Social Ms Page 1 of 24 Brought to you by: Jonathan Gebauer, Susanna Gebauer INTRODUCTION Email Marketing

More information

Linux Files and the File System

Linux Files and the File System Linux Files and the File System 1. Files a. Overview A simple description of the UNIX system, also applicable to Linux, is this: "On a UNIX system, everything is a file; if something is not a file, it

More information

COMP2100/2500 Lecture 17: Shell Programming II

COMP2100/2500 Lecture 17: Shell Programming II [ANU] [DCS] [COMP2100/2500] [Description] [Schedule] [Lectures] [Labs] [Homework] [Assignments] [COMP2500] [Assessment] [PSP] [Java] [Reading] [Help] COMP2100/2500 Lecture 17: Shell Programming II Summary

More information

Revision control. INF5750/ Lecture 2 (Part I)

Revision control. INF5750/ Lecture 2 (Part I) Revision control INF5750/9750 - Lecture 2 (Part I) Problem area Software projects with multiple developers need to coordinate and synchronize the source code Approaches to version control Work on same

More information

Windows 2000 / XP / Vista User Guide

Windows 2000 / XP / Vista User Guide Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

Architecture. Steven M. Bellovin October 27,

Architecture. Steven M. Bellovin October 27, Architecture Steven M. Bellovin October 27, 2015 1 Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache

More information

What is version control? (discuss) Who has used version control? Favorite VCS? Uses of version control (read)

What is version control? (discuss) Who has used version control? Favorite VCS? Uses of version control (read) 1 For the remainder of the class today, I want to introduce you to a topic we will spend one or two more classes discussing and that is source code control or version control. What is version control?

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: November 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

Hints for Instructors

Hints for Instructors APPENDIX C Hints for Instructors This appendix is addressed to faculty members and graduate students teaching Math 473. Most of it should apply to other Math courses that use computers, with suitable changes.

More information

Input/Output Management

Input/Output Management Chapter 11 Input/Output Management This could be the messiest aspect of an operating system. There are just too much stuff involved, it is difficult to develop a uniform and consistent theory to cover

More information

Learning vrealize Orchestrator in action V M U G L A B

Learning vrealize Orchestrator in action V M U G L A B Learning vrealize Orchestrator in action V M U G L A B Lab Learning vrealize Orchestrator in action Code examples If you don t feel like typing the code you can download it from the webserver running on

More information

1Z Oracle. MySQL 5 Database Administrator Certified Professional Part I

1Z Oracle. MySQL 5 Database Administrator Certified Professional Part I Oracle 1Z0-873 MySQL 5 Database Administrator Certified Professional Part I Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-873 A. Use the --log-queries-indexes option. B. Use the

More information

CSE 374 Programming Concepts & Tools. Hal Perkins Winter 2012 Lecture 16 Version control and svn

CSE 374 Programming Concepts & Tools. Hal Perkins Winter 2012 Lecture 16 Version control and svn CSE 374 Programming Concepts & Tools Hal Perkins Winter 2012 Lecture 16 Version control and svn Where we are Learning tools and concepts relevant to multi-file, multi-person, multi-platform, multi-month

More information

Become a Champion Data Modeler with SQL Developer Data Modeler 3.0

Become a Champion Data Modeler with SQL Developer Data Modeler 3.0 Become a Champion Data Modeler with SQL Developer Data Modeler 3.0 Marc de Oliveira, Simplify Systems Introduction This presentation will show you how I think good data models are made, and how SQL Developer

More information

World Sync, Clone, and Snapshot... Overview and Introduction. School of IS Curtin University. Overview

World Sync, Clone, and Snapshot... Overview and Introduction. School of IS Curtin University. Overview Sync, Clone, and Snapshot... World 2012 Dr Ashley Aitken Curtin University A.Aitken@Curtin.Edu.Au AshleyAitken (Twitter, Skype, LinkedIn) 1 2 Overview and Introduction 3 4 Preamble Summary Q & A Overview

More information

If you re the administrator on any network,

If you re the administrator on any network, Let s do an inventory! If you re the administrator on any network, chances are you ve already faced the need to make an inventory. In fact, keeping a list of all the computers, monitors, software and other

More information

Study Guide Processes & Job Control

Study Guide Processes & Job Control Study Guide Processes & Job Control Q1 - PID What does PID stand for? Q2 - Shell PID What shell command would I issue to display the PID of the shell I'm using? Q3 - Process vs. executable file Explain,

More information

Working in Teams CS 520 Theory and Practice of Software Engineering Fall 2018

Working in Teams CS 520 Theory and Practice of Software Engineering Fall 2018 Working in Teams CS 520 Theory and Practice of Software Engineering Fall 2018 Version Control September 18, 2018 Thursday (September 20) First in-class exercise On using git (today is a prelude with useful

More information

Enable the Always Offline Mode to Provide Faster Access to Files

Enable the Always Offline Mode to Provide Faster Access to Files Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows

More information

XP: Backup Your Important Files for Safety

XP: Backup Your Important Files for Safety XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to

More information

Chapter-3. Introduction to Unix: Fundamental Commands

Chapter-3. Introduction to Unix: Fundamental Commands Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system

More information

FreeBSD Jails vs. Solaris Zones

FreeBSD Jails vs. Solaris Zones FreeBSD Jails vs. Solaris Zones (and OpenSolaris) James O Gorman james@netinertia.co.uk Introduction FreeBSD user since 4.4-RELEASE Started using Solaris ~3.5 years ago Using jails for website hosting

More information

The Perl Debugger. Avoiding Bugs with Warnings and Strict. Daniel Allen. Abstract

The Perl Debugger. Avoiding Bugs with Warnings and Strict. Daniel Allen. Abstract 1 of 8 6/18/2006 7:36 PM The Perl Debugger Daniel Allen Abstract Sticking in extra print statements is one way to debug your Perl code, but a full-featured debugger can give you more information. Debugging

More information

Topics. File Buffer Cache for Performance. What to Cache? COS 318: Operating Systems. File Performance and Reliability

Topics. File Buffer Cache for Performance. What to Cache? COS 318: Operating Systems. File Performance and Reliability Topics COS 318: Operating Systems File Performance and Reliability File buffer cache Disk failure and recovery tools Consistent updates Transactions and logging 2 File Buffer Cache for Performance What

More information

DataFax and Solaris Zones. An Introduction

DataFax and Solaris Zones. An Introduction DataFax and Solaris Zones Darryl Pahl DF/Net Research, Inc. An Introduction Once upon a time, I used to be a UNIX systems administrator Now I m the one who: researches, procures, orders installs, configures,

More information

Implement an ADT while using Subversion

Implement an ADT while using Subversion 1 Objectives Learn to use Subversion Implement an ADT while using Subversion In this lab, you learn about the version control tool called Subversion and you will implement a Java class given an interface.

More information

OES2 SP1 Migration Utility By Kevin Hurni

OES2 SP1 Migration Utility By Kevin Hurni OES2 SP1 Migration Utility By Kevin Hurni Migration Scenario: Transfer all data and services from NetWare server to OES2 SP1 server. This includes the Identity transfer. Pre-requisites: OES2 SP1 server

More information

A proposal to solve the patient data problem. (Yes, this is a manifesto)

A proposal to solve the patient data problem. (Yes, this is a manifesto) A proposal to solve the patient data problem (Yes, this is a manifesto) Author: Jeroen W.J. Baten Version: 0.2 Date: April 7th, 2014 Table of Contents Introduction...3 History...3 Ground rules...3 The

More information

This course is for those wanting to learn basic to intermediate topics in Solaris 10 system administration.

This course is for those wanting to learn basic to intermediate topics in Solaris 10 system administration. Course Summary Description This course teaches basic to intermediate topics in Solaris 10 system administration. The operating system will be Oracle Solaris 10 (SunOS 5.10 Release 1/13 U11). Objectives

More information

FROM 4D WRITE TO 4D WRITE PRO INTRODUCTION. Presented by: Achim W. Peschke

FROM 4D WRITE TO 4D WRITE PRO INTRODUCTION. Presented by: Achim W. Peschke 4 D S U M M I T 2 0 1 8 FROM 4D WRITE TO 4D WRITE PRO Presented by: Achim W. Peschke INTRODUCTION In this session we will talk to you about the new 4D Write Pro. I think in between everyone knows what

More information

Oracle 1Z Oracle Solaris 11 System Administration.

Oracle 1Z Oracle Solaris 11 System Administration. Oracle Oracle Solaris 11 System Administration http://killexams.com/exam-detail/ QUESTION: 147 Review the boot environments displayed on your system: Which option describes the solaris-1 BE? A. It is active

More information

The goal of this book is to teach you how to use Adobe Integrated

The goal of this book is to teach you how to use Adobe Integrated Clearing the AIR The goal of this book is to teach you how to use Adobe Integrated Runtime (AIR) to create desktop applications. You can use JavaScript or ActionScript to develop AIR applications, and

More information

Functions and Decomposition

Functions and Decomposition Unit 4 Functions and Decomposition Learning Outcomes Design and implement functions to carry out a particular task. Begin to evaluate when it is necessary to split some work into functions. Locate the

More information

Operating Systems Linux 1-2 Measurements Background material

Operating Systems Linux 1-2 Measurements Background material Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing

More information

Moving from FrameMaker to Blaze: Best Practices

Moving from FrameMaker to Blaze: Best Practices Moving from Adobe FrameMaker to MadCap Blaze is easy, although to get the best results you need to do some planning before you start. This document discusses suggestions and issues to make the import result

More information

CST8207: GNU/Linux Operating Systems I Lab Nine Disks, Partitions, and File Systems Part 2. Disks, Partitions, and File Systems - Part 2 of 2

CST8207: GNU/Linux Operating Systems I Lab Nine Disks, Partitions, and File Systems Part 2. Disks, Partitions, and File Systems - Part 2 of 2 Student Name: Lab Section: Disks, Partitions, and File Systems - Part 2 of 2 1 Due Date - Upload to Blackboard by 8:30am Monday April 9, 2012 Submit the completed lab to Blackboard following the Rules

More information

Case Study: Access Control. Steven M. Bellovin October 4,

Case Study: Access Control. Steven M. Bellovin October 4, Case Study: Access Control Steven M. Bellovin October 4, 2015 1 Case Studies in Access Control Joint software development Mail Steven M. Bellovin October 4, 2015 2 Situations Small team on a single machine

More information

Process Synchroniztion Mutual Exclusion & Election Algorithms

Process Synchroniztion Mutual Exclusion & Election Algorithms Process Synchroniztion Mutual Exclusion & Election Algorithms Paul Krzyzanowski Rutgers University November 2, 2017 1 Introduction Process synchronization is the set of techniques that are used to coordinate

More information

Crash Consistency: FSCK and Journaling. Dongkun Shin, SKKU

Crash Consistency: FSCK and Journaling. Dongkun Shin, SKKU Crash Consistency: FSCK and Journaling 1 Crash-consistency problem File system data structures must persist stored on HDD/SSD despite power loss or system crash Crash-consistency problem The system may

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

This is Lab Worksheet/Installation 7

This is Lab Worksheet/Installation 7 This is Lab Worksheet/Installation 7 This Lab Worksheet/Installation contains essential installation work needed for your upcoming Assignments. You do not have to hand in this Lab Worksheet, but there

More information

It s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.

It s possible to get your  inbox to zero and keep it there, even if you get hundreds of  s a day. It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated, though it does take effort and discipline. Many people simply need

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

Understanding the Dark Side

Understanding the Dark Side Understanding the Dark Side An Analysis of Drupal (and Other!) Worst Practices Kristen Pol Understanding the Dark Side An Analysis of Drupal (and Other!) Worst Practices Kristen Pol Image Source: http://bit.ly/1pb9en9

More information

A Practical Guide to Cost-Effective Disaster Recovery Planning

A Practical Guide to Cost-Effective Disaster Recovery Planning White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the

More information

STORAGECRAFT SHADOWPROTECT 5 DESKTOP

STORAGECRAFT SHADOWPROTECT 5 DESKTOP STORAGECRAFT SHADOWPROTECT 5 DESKTOP PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Businesses are becoming less centralized in the 21st century with many more workers relying on laptops as their

More information

Linux Command Line Interface. December 27, 2017

Linux Command Line Interface. December 27, 2017 Linux Command Line Interface December 27, 2017 Foreword It is supposed to be a refresher (?!) If you are familiar with UNIX/Linux/MacOS X CLI, this is going to be boring... I will not talk about editors

More information

Exercise sheet 1 To be corrected in tutorials in the week from 23/10/2017 to 27/10/2017

Exercise sheet 1 To be corrected in tutorials in the week from 23/10/2017 to 27/10/2017 Einführung in die Programmierung für Physiker WS 207/208 Marc Wagner Francesca Cuteri: cuteri@th.physik.uni-frankfurt.de Alessandro Sciarra: sciarra@th.physik.uni-frankfurt.de Exercise sheet To be corrected

More information

About CVS. 1 Version Control - what is it? why is it useful?

About CVS. 1 Version Control - what is it? why is it useful? About CVS CVS stands for Concurrent Version Control. It s free, open-source software used by multiple developers to share code, keep track of changes, and keep different versions of a project. it can be

More information

RavenDB & document stores

RavenDB & document stores université libre de bruxelles INFO-H415 - Advanced Databases RavenDB & document stores Authors: Yasin Arslan Jacky Trinh Professor: Esteban Zimányi Contents 1 Introduction 3 1.1 Présentation...................................

More information

Lab #0 Getting Started Due In Your Lab, August 25, 2004

Lab #0 Getting Started Due In Your Lab, August 25, 2004 Lab #0 Getting Started Due In Your Lab, August 25, 2004 Name: Lab Time: Grade: /10 Man UNIX systems contain on-line manuals called man pages that are accessed through the program man. To find out how to

More information

CSE380 - Operating Systems

CSE380 - Operating Systems CSE380 - Operating Systems Notes for Lecture 17-11/10/05 Matt Blaze, Micah Sherr (some examples by Insup Lee) Implementing File Systems We ve looked at the user view of file systems names, directory structure,

More information

Leopard Installation. It s not as easy or as complicated as it sounds

Leopard Installation. It s not as easy or as complicated as it sounds Leopard Installation It s not as easy or as complicated as it sounds Sources Take Control ebook Taking Control of Upgrading to Leopard Mac related internet sites Opinions of other WAP gurus Experience

More information

Lecture 10 File Systems - Interface (chapter 10)

Lecture 10 File Systems - Interface (chapter 10) Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 10 File Systems - Interface (chapter 10) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The

More information

Connect with Remedy - Remedy 9 Upgrade Best Practices Webinar Q&A

Connect with Remedy - Remedy 9 Upgrade Best Practices Webinar Q&A Connect with Remedy - Remedy 9 Upgrade Best Practices Webinar Q&A Date: Wednesday, March 02, 2016 Q: Does this cover version 9.1 and 9.0? A: It covers upgrading from older versions to 9.1 Q: What is granular

More information

Case Studies in Access Control

Case Studies in Access Control Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems

More information

CS 2400 Laboratory Assignment #1: Exercises in Compilation and the UNIX Programming Environment (100 pts.)

CS 2400 Laboratory Assignment #1: Exercises in Compilation and the UNIX Programming Environment (100 pts.) 1 Introduction 1 CS 2400 Laboratory Assignment #1: Exercises in Compilation and the UNIX Programming Environment (100 pts.) This laboratory is intended to give you some brief experience using the editing/compiling/file

More information

lessons learned from living with LDAP

lessons learned from living with LDAP B R E N D A N Q U I N N lessons learned from living with LDAP Brendan Quinn has more than 14 years of experience as a sysadmin, security engineer, and infrastrucure engineer. He is currently a Senior Infrastructure

More information